summaryrefslogtreecommitdiff
path: root/sys/src/9/port/devsegment.c
diff options
context:
space:
mode:
authorcinap_lenrek <cinap_lenrek@felloff.net>2023-04-08 20:30:47 +0000
committercinap_lenrek <cinap_lenrek@felloff.net>2023-04-08 20:30:47 +0000
commit60b1a2f82dc96b254d6dec1bfd1c14ca056c21dd (patch)
tree1de5c2c26d7f7d0a0def0bbe4c11971a12735730 /sys/src/9/port/devsegment.c
parentbd43bd6f1ae1b1ec7ee6873d9fd6766b049802e9 (diff)
kernel: Clear secrets on reboot
The idea is that when we reboot, we zero out memory written by processes that have the private flag set (such as factotum and keyfs), and also clear the secrmem pool, which contains TLS keys and the state of the random number generator. This is so the newly booted kernel or firmware will not find these secret keys in memory.
Diffstat (limited to 'sys/src/9/port/devsegment.c')
-rw-r--r--sys/src/9/port/devsegment.c9
1 files changed, 2 insertions, 7 deletions
diff --git a/sys/src/9/port/devsegment.c b/sys/src/9/port/devsegment.c
index d24e0b72e..8c3a503ea 100644
--- a/sys/src/9/port/devsegment.c
+++ b/sys/src/9/port/devsegment.c
@@ -467,7 +467,6 @@ Found:
static Segment*
fixedseg(uintptr va, ulong len)
{
- KMap *k;
Segment *s;
Page **f, *p, *l, *h, *t;
ulong n, i;
@@ -522,15 +521,11 @@ fixedseg(uintptr va, ulong len)
p++;
p->ref = 1;
p->va = va;
+ va += BY2PG;
p->modref = 0;
settxtflush(p, 1);
-
- k = kmap(p);
- memset((void*)VA(k), 0, BY2PG);
- kunmap(k);
-
+ zeropage(p);
segpage(s, p);
- va += BY2PG;
} while(p != l);
poperror();
return s;